21
• The processes by which a person, machine, or entity has
entitlements to resources granted or removed based on defined
requirements and/or job roles
• Requires BGP to get a network path to the resources
• Requires DNS to provide a lookup to them
• Requires PKI and associated Federation technologies to assure
that the processes used to establish identity and associate them
with a provable digital identity
– Also requires DNS to look up and provide a path to the root
certificates needed to verify and validate digital identities
• Requires well-defined roles, requirements, and entitlement
definitions – especially for dynamic cloud machines!
• Provides the “who did what” for logging, auditing, Blockchain, and
other distributed technologies
Identity and Access Management
(IAM/IDM)